HTTP: Microsoft Excel Axisparent Record Index Handling Code Execution

This signature detects an attempt to exploit a known code execution vulnerability in Microsoft Excel. In a successful attack where arbitrary code is attempted to be injected and executed on the target machine, the behavior of the target is dependent on the intention of the malicious code. In an unsuccessful attack, the application can terminate. If unexpected application termination is the sole result of an attack, there is no impact to the overall operation of the target host. It is, however, possible to lose all unsaved data.

Extended Description

Microsoft Excel is prone to a remote code-execution vulnerability. Attackers may exploit this issue by enticing victims into opening a maliciously crafted Excel file. Successful exploits may allow attackers to execute arbitrary code with the privileges of the user running the application. This may facilitate a compromise of vulnerable computers.

Affected Products

Avaya messaging_application_server,Microsoft office_2008_for_mac

References

BugTraq: 30638

CVE: CVE-2008-3004

Short Name
HTTP:STC:DL:XLS-AXISPARENT
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Axisparent CVE-2008-3004 Code Excel Execution Handling Index Microsoft Record bid:30638
Release Date
10/12/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown
Vendors

Avaya

Microsoft

CVSS Score

9.3

Found a potential security threat?